Multilevel Security Using Honeypot - Journal of Scientific ...

Page created by Kathryn Taylor
 
CONTINUE READING
Multilevel Security Using Honeypot - Journal of Scientific ...
International Journal of Scientific Research & Engineering Trends
                                                 Volume 7, Issue 3, May-June-2021, ISSN (Online): 2395-566X

                        Multilevel Security Using Honeypot
    M. Tech. Scholar Yamini S. Shegaonkar, Asst Prof. Dr. Leena Patil, Asst Prof. Dr. Shrikant Zade
                                      Department of Computer Science & Engineering,
                                                  P.I.E.T. Nagpur, India
                        Yaminishegaonkar1995@gmail.com, lhpatil10@gmail.com, dzshrikant@gmail.com

Abstract- Security is becoming a major issue today. A Security is not limited to laptops and other devices. Data security is
becoming more and more important today. Data is not safe in any social situation since any person with access to hacking can
access data, so that any organization can protect its data against any type of cyber attack. It is important. It is an imperative
task, and work. This is why honeypot security is used primarily for data protection. Interacting with the location of attackers
and attackers, network of attackers and malware assault details is the main work of this security. Honeypot will create data
logs for attackers. Honeypot supplies a researcher with relevant data on attackers. They might understand easily. Honeypot
and its benefits will be examined in this paper. We will also learn how Honeypot interacts and collects information and keeps
data secure from attackers.

Keywords- Honeypot, Security.

                 I. INTRODUCTION                                  information to observe and record detailed information of
                                                                  the attacker, create a log of malicious entries, and verify
Internet security is very important in today's world. Each        the level, purpose, tools and methods are used by the
company runs on the Internet. Attackers will constantly           attacker so that they can get evidence and take it further
develop new and innovative techniques. Take advantage             Measurements can be taken.
of network security. They started to counter the techniques
employed by them to overcome this security issue, but                         II. WHAT IS HONEYPOT?
they were attackers. It's a difficult task. Security scientists
have therefore introduced the concept of interacting with         All the first our builds a honeypot on and a system. Us
honeypot.                                                         One tries on and finds a security flaw where exists in a
                                                                  machine After defines all of our will attempt to attack on a
Honeypot are a secure resource. They do not provide any           system. That the hacker will be able to access the system.
solution to network problems and do not fix anything.             He has used to finding in a change occurred in the victim
They are used as tools. This tool can be used for                 system by see a truck has left behind a hacker. Also, We
construction or destructive proposals depending on the            think about an issue, which brings to a topic system deeper
user's interests.                                                 than. It is useful for a network security administrators to
                                                                  create increasingly secure systems and recognize threads.
It plays an important role in the capture of an insider
threat. The strategy is to analyze and resolve the following      Honeypot are a type of network security tool, and most
issues, considering the issues that may occur in the system,      network security tools we've seen have been largely
to protect information resources. Honeypot security is            passive.It has a dynamic database of available rules and
primarily used for defensive purposes. Currently, some            signatures and operates on these rules. That's why further
laboratories are leveraging security defense technology to        detection is limited to the available rule sets.
increase the initiative in security defense measures.
Mainly, set a deception target similar to the actual system.      All activity that does not match the specified rule and the
                                                                  signature will move under the radar undetected. Honeypot
These security defense technologies allow attackers to            allow you to place villains (hackers) who have the
believe that an information system has valuable security          initiative. This system has no production value without
resources available, allowing attackers to connect to these       approved activities. All interactions with honeypot are
resources and escape the light target can do. At the same         intentionally considered malicious.
time, it can significantly increase the attacker's workload,
instruction complexity and uncertainty.                           The combination of honeypot is holiness. In general, do
                                                                  not solve security issues, but system administrators do
It can affect attacks on honeypot without the attacker            provide information and knowledge to help improve the
knowing that they have entered a honeypot successfully.           overall security of networks and systems. This knowledge
The honeypot can detect attacker behavior or intrusion            can act as an intrusion detection system and can be used as

                                                        © 2021 IJSRET
                                                             1357
Multilevel Security Using Honeypot - Journal of Scientific ...
International Journal of Scientific Research & Engineering Trends
                                              Volume 7, Issue 3, May-June-2021, ISSN (Online): 2395-566X

an input for early warning systems. Over the years, Other types of attacks include the Masquerading attacks
researchers have used honeypot and honeypot to when the attacker impersonates as if it were another
successfully isolate the effectiveness of worms and object.
exploits.                                                      Attacker User Fake The identity of a legitimate user.
                                                               Replay Attack In a replay attack, an attacker captures and
Honeypot extend the concept of a single honeypot to a           resend data to produce malicious effects. It's a kind of
highly controlled honeypot network. Honeypot is a               intermediate attack.
condition of a special network architecture that provides  Corrective Attack This type of attack breaks the integrity
control, data capture, and data collection. This architecture   of the message. An attacker modifies a message or file to
builds a controlled network that can control and monitor        achieve a malicious goal.
the activity of all types of systems and networks.             Denial of Service (DOS) Attack In a DOS attack, an
                                                                attacker blocks legitimate users from accessing
              III. TYPES OF HACKER                              information or services. An attacker can block your
                                                                computer and network connection or target the computer
Hackers are generally divided into two main categories.         and network of your site from accessing email, websites,
                                                                online accounts (such as banks) and other services. It
1. Black Hats:                                                  depends on the affected computer.
Black Hat hackers are the greatest threat from inside and  The TCP and ICMP scans are also a form of active attack
outside the IT infrastructure of any organization as they       where attackers exploit methods designed to respond to
continually challenge the security of applications and          the protocol. For example, ping of death synchronization
services. They are also called "crackers". Those who            attacks, etc.
specialize in these intrusions. There are many possible
reasons for these types of penetration to be part of In any kind of active attack, the attacker generates noise
benefits, joy, political motivation and social causes. These on the network and sends packets, allowing the attacker to
intrusions often involve data modification / corruption.       be detected and tracked. Depending on the skill level, skill
                                                               pool attackers are generally observed to attack victims
2. White Hat:                                                  from previously damaged proxy targets.
White Hat Hackers are similar to Black Hat Hackers, but
there are an important difference that White Hat Hackers 2. Passive Attacks:
do so without criminal intent. You can hire or contact Passive attacks include those that allow an attacker to
people of this kind to test various corporate systems and intercept, collect and monitor all transport has sent by a
software around the world.                                     victim. Therefore, you can eavesdrop on the victim, listen
                                                               to the victim's words in the process, and target
They check how secure these systems are and a pin- communication. Passive attacks are a very special type of
pointing out any errors are found.                             the attack that obtains information has transmitted over
This hacker is a person specializing in a penetration testing unsafe and unsafe channels. Attackers do not generate a
or a security expert, also known as "an ethical hacker".       noise or a minimal noise in the network, which makes it
                                                               very difficult to detect and identify.
These types of people are also known as the Tiger Team.
These experts can perform tests using a variety of methods Passive attacks can be divided into two main types:
and techniques, including the use of social engineering  Publishing message content and analyzing traffic. A
tactical hacking tools, evading a security and attempting to    message Content Protects the message content from
break into protected areas, but this are only to find           unauthorized users during the release transfer. This could
weaknesses in the system.                                       just be a phone conversation, an instant messenger chat, a
                                                                message delivered via email or a file.
              IV. TYPES OF ATTACK                              The traffic analysis, which includes the technology that
                                                                an attacker uses to retrieve the actual message in the
There are many types of attacks that can be categorized         victim has's encrypted intercepted a message. The
under 2 major categories                                        encryption provides a way to use mathematical formulas
                                                                to mask the content of a message and make it unreadable.
1. Active Attacks:                                              The original message can only be retrieved through the
Active attacks are malicious, taking attacks to gain            reverse process of a decryption.
unauthorized access to the target system by an attacker  This encryption system is often based on key or a
performing a thorough user password combination, such           password as a user input. With a traffic analysis, an
as a brute force attack. Includes sending packets to the        attacker can passively observe message patterns, trends, a
victim. It exploits remote and local vulnerabilities in         frequency, and the length to guess the key or obtain the
services and applications called “holes".                       original message by various decryption systems.

                                                     © 2021 IJSRET
                                                          1358
Multilevel Security Using Honeypot - Journal of Scientific ...
International Journal of Scientific Research & Engineering Trends
                                               Volume 7, Issue 3, May-June-2021, ISSN (Online): 2395-566X

           V. TYPES OF HONEYPOT                                 to prevent attackers from identifying them. The identity of
                                                                the honeypot is very important and the attacker's learning
Honeypot are generally divided into two main categories.        curve can be concluded to be the most secret of the
                                                                honeypot, directly proportional. These types of honeypots
1. Production Honeypot:                                         are generally distributed to highly interacting honeypots.
Production honeypots are honeypots that are placed in the
production network for the detection. they Extends the                VI. PROPOSED METHODOLOGY
functionality of the intrusion detection systems. These
types of honeypots are developed and coordinated to
integrate with your organization's infrastructure. It is
typically implemented in less interacting honeypots and
may vary based on the available funding and the expertise
required by the organization.

The production honeypot can be placed within the sub net
of the application and the authentication server and can
identify all attacks towards that subnet. Therefore, it can
be used to identify all internal and external threats to your
organization. These types of honeypots can also be used to
detect malware radio waves from networks with zero-day
exploits. IDS detection is based on the database signature,
so attacks that are not defined in the database will not be
detected.

This is where the honeypot illuminating the intrusion
detection system. It provides a network situational
awareness and supports the system and network
administrators. Based on these results, administrators can
make the decisions they need to add or enhance their                               Fig 1. System Flow.
organization's security resources. Firewalls, IDS and IPS,
etc.

2. Research Honeypot:
Research Honeypots are distributed by the network
security researchers, White Hat Hackers. Their main
purpose is to learn the tools, aforementioned and
techniques of black hat hackers who abuse computers and
network systems. This honeypot gives the attacker the
complete freedom, and, in the process, is placed on the
idea of learning his tactics from his movements within the
system.

Research honeypots help security researchers isolate the
attacker's tools they have used to exploit their systems.
Then carefully study in a sandbox environment to identify
zero-day exploits.

Worms and viruses that spread throughout the network can
also be isolated and studied. Next, the researchers                                 Fig 2. Data Flow.
document the findings and share them with system
programmers, the network and system administrators and     The planned study aims to research the performance of
a various system and antivirus vendors. They provide the   intrusion detection systems victimisation honeypots. The
raw material for the rules engine of IDS, IPS and firewall king protea system is simulated in several environments,
systems.                                                   Windows and UNIX, victimisation the suitable king protea
                                                           tools.
The Research Honeypot acts as an early warning system.  The king protea system is connected to a network to tug
They are designed to detect and log the maximum amount      in knowledge {the knowledge|the info|the information}
of information from intruders, but they are stealth enough  within the data packets collected on the network is

                                                      © 2021 IJSRET
                                                           1359
Multilevel Security Using Honeypot - Journal of Scientific ...
International Journal of Scientific Research & Engineering Trends
                                               Volume 7, Issue 3, May-June-2021, ISSN (Online): 2395-566X

 analyzed. the info collected victimisation the planned         This process solely done by user and admin solely seen
 simulation king protea are compared to existing king           this data however admin will don’t modified data placed in
 protea technology.                                             information.
 King protea may be a system that collects data.
 Honeypots area unit usually behind a firewall. king           3. Login Info:
  protea is principally accustomed simulate varied              Computer Security Login is that the method by that a
  services and loopholes to guide varied attacks and            private identifies, authenticates, and accesses a automatic
  therefore the incidence of attack knowledge.                  data processing system. User credentials or typically
 Notifications area unit sent to the administrator             within the variety of a "password" that matches a
  associated system once an interloper makes an attempt         "username", and these credentials themselves are called
  to enter the system with faux identity.                       logins.
 once somebody tries to enter the system, a log of all
  things is generated.                                          The user enters the user name. The user enters the secret.
 Notwithstanding associate interloper with success enters      Applies to all or any users. The software package confirms
  the system and retrieves knowledge from the                   the user name and secret. A "shell" is generated supported
  information, it will still offer faux knowledge and be        what you enter. This file is thought because the system
  fooled. The king protea will, however the aggressor is        login file and reads data during this file once all users log
  unaware of this misinformation. this permits United           in. scan a lot of from the "profile" go in your "home"
  States of America to hunt the system and fool intruders.      directory.
 Logs area unit generated at an equivalent time, therefore
  all knowledge of the aggressor like system information        This file is termed the private login file. it always contains
  processing, attack sort, attack pattern, obtainable           a "menu" program out suggests that terminating access to
  footprints, etc. area unit recorded, and proof attack         a automatic data processing system or internet site. Upon
  strategies which will be used for different actions area      work out, the system or web site is notified that this user
  unit recorded. I will.                                        desires to finish the login session.

1. Registration:                                                Conjointly called logout, logoff, sign off, or logout.
The registration method is that the method of assembling        amount|the amount} between login and logout is that the
individual scans into a clean purpose cloud. It will retrieve   period of the login session throughout that the
raw scan knowledge collected within the field and the           administrator will perform tasks. you'll close to stop
supply purpose which will be used for the modeling and          alternative users from accessing your system while not
measurements. The step.1 is the registration method.            confirmatory your credentials. it's conjointly a very
Within the method, users should offer their email ID and a      important a part of security because it helps shield current
number and enter personal info of regarding people. All         users' access and stop meddling with this login session.
this info will ought to be hold on in an exceedingly            Logout secures user access and user credentials when a
information. This is an often most imp method as a result       work session.
of the user enters info that the knowledge few specific
person is completed.                                            4. Honeypot:
                                                                Honeypot may be a Niels Proves open computer
Users will enter their own username, that is needed for the     programes that enables purchasers to set up and run
login method. Users can even offer their own personal           multiple virtual hosts on the network. Hosts will be
word. This is often personal to all or any users. The user      designed to run any service and may be tailored to goals
name could be a name that unambiguously identifies              that offer the impression that they're running a specific
somebody on your automatic data a processing system.            software. Honeypot enhances cyber security by providing
Usernames an area unit has in most cases paired with a          a spread of mechanisms for threat detection and
mix of passwords, typically observed as a login, needed         assessment.
for users to log into an internet site.
                                                                Honeypot is associate degree open supply programming
2. Database:                                                    tool free underneath the antelope General Public License.
Database is a group of data is organized in order that it is    Despite being industrially employed by several honey
simply accused, managed and updated electronic database         organizations, it's created while not cash in your spare
usually contain aggregations of information records or          time. The Honeypot may be a pod design with low
files, containing data concerning sales transactions or         interaction associate degreed permits one host laptop to
interactions with specific customers.                           say an unused IP address on an area network (LAN) and
Now, the most task of information is user that give their       reproduce a pod assertion virtual machine. Reproduces the
data that data directly save on information. This data will     network stack of the simulated system, creating it reply to
do modified by solely user.                                     3 major IP protocols: Transmission management Protocol

                                                      © 2021 IJSRET
                                                           1360
Multilevel Security Using Honeypot - Journal of Scientific ...
International Journal of Scientific Research & Engineering Trends
                                               Volume 7, Issue 3, May-June-2021, ISSN (Online): 2395-566X

(TCP), User Datagram Protocol (UDP),               and net      During this method, initial check the login data, produce
management Message Protocol (ICMP).                             associate OTP generator, check the OTP once more, attend
                                                                future step, that is that the UID range, check once more,
The destination IP reacts to network packets happiness to       attend the server. Security. With Protea cynaroides
1 of the virtual king protea networks. We tend to or            security, hackers do not know to maneuver to Protea
supporting network tunneling that permits simulation and        cynaroides security. the subsequent honeypots fill out a
cargo of distributed address areas with Honeypot                particular variety of the hacker to access the hacker data,
topology.                                                       which implies the hacker's location hacker system's
                                                                scientific discipline address hacking time hacking attack.
Communications protocol this is often a regular protocol
that defines however this program maintains and                 5.1 OTP Generator:
establishes network conversations that exchange                 In computer science, a generator is a habit that can be used
information. It conjointly defines however computers send       to control the repetition between a loop. All generators are
information packets to every alternative.                       also notifications. A Creator resembles a function that
                                                                returns an array that creates a number of values.
This is often a part of the net Protocol Suite and is           Generators can be made according to the flow of receptive
employed by programs running on numerous computers              control flow. The generator is often called in the loop.
on the network. it's accustomed send short messages,            The first time a generator returned in a loop.
however it's associate degree unreliable, connectionless
protocol.                                                       All forms must often be, the process input and other data
                                                                in the forms several times can be a slower moving process.
ICMP is associate degree extension of the net Protocol as       With these forms that can be digitized into a one-time
outlined in RFC 792. Supports packets containing error          entry-level solution, organizations can continue to move.
management and informational messages. this is often            Simply expressed, your candidate may be able to enter the
employed by network devices that generate a message             filled works. Whether you have how many forms of this
containing a blunder if there's a retardant with the delivery   conversion request, the ability to enter once, to fill out
of IP packets.                                                  information about all other application forms, crop your
                                                                paper paper into an old time investment.
A protocol that enables IGMP hosts to apprize
neightboring switches and routers of multicast cluster          5.2 UID Number:
membership. Employed by the communications protocol /           A Unique symbol may be a secured distinctive symbol for
IP protocol suite to attain dynamic multicasting.               that object and any symbol used for a selected purpose.
FTP A protocol accustomed transfer files between                this idea was developed early within the development of
shoppers and servers on a network. SSH A protocol               engineering and knowledge systems. typically this was
accustomed firmly operate network services over                 related to automatic knowledge sorts. The UID variety
unsecured networks.                                             consists of twelve digits. These eleven digits yield an area
                                                                of up to a hundred billion numbers which will last over
As king protea focuses on military operation. It will give      many centuries. The UID not solely takes a long-run
valuable insights into the attack techniques employed by        perspective, however conjointly scientifically accesses the
your organization, that permits you to make specific            listing system whereas conjointly considering the success
countermeasures that scale back the worth of your system.       security issue.
The data gathered can even be helpful in capturing and
prosecuting anyone making an attempt to attack.                             VII. RESULT & OUTPUT
For to be effective, the king protea ought to be purported
to simulate the malicious activity of the particular system
and contain data and price resources. It collects and
occupies external and internal hackers, thus you'll collect
the maximum amount as you'll.

5. Application Server:
The application server that hosts the application. The
appliance server framework may be a computer code
framework for building application servers. the appliance
server framework provides the flexibility to form net                               Fig 3. Front View.
applications and therefore the server surroundings to run
them.

                                                      © 2021 IJSRET
                                                           1361
Multilevel Security Using Honeypot - Journal of Scientific ...
International Journal of Scientific Research & Engineering Trends
                              Volume 7, Issue 3, May-June-2021, ISSN (Online): 2395-566X

  Fig 4. Admin Login.

                                                               Fig 8. About Us.

                                                          VIII. CONCLUSION
                                          The Honeypot system provides a secure system to
                                          maintain private data. The software can register users and
                                          after a registration, he enters the signing process with five
                                          levels.

                                          When all levels are accurate, it accessing the service
                                          server to the service. If not, he goes to the Honeypot
                                          server. It is a web-based an application that can be used
Fig 5. User Registration.                 online with a database server area. There are many types
                                          of attacks Because this attacker attacks system data and a
                                          permanent theft. Therefore, it is very useful to keep
                                          confidential data, and increase reliability.

                                          It Has worked on the Honeypot network based on a web in
                                          which the user's information is specified (name, age,
                                          gender, address, telephone, mobile).

                                          Has worked on providing server services for users
                                          (uploaded, downloaded, by mail) a honeypot is a new file
                                          filed on the field of a network security. Currently, these
                                          are many studies and discussions worldwide.

Fig 6. Document Pannel.                   No other mechanical comparison in the effectiveness of a
                                          honeypot. If the information meeting is a main goal
                                          especially if the tool that uses a subscriber. When the
                                          Honeypot progresses, hackers also develop methods to
                                          detect such systems.

                                          A conventional gun race can begin between good people
                                          and the Black hat community.We are using the different
                                          levels of security to increase the security of the honeypot
                                          system. Using Random Number Generator for OTP
                                          Generation.

                                          Unaunthiticated person can’t register here. We record
                                          information about the attacker i.e. username which is used,
                                          Login time, Logout time and date.If unauthorized person
                                          log into the system they directly goes to the honeypot
Fig 7. Honeypot Server.                   system.

                                  © 2021 IJSRET
                                      1362
International Journal of Scientific Research & Engineering Trends
                                              Volume 7, Issue 3, May-June-2021, ISSN (Online): 2395-566X

                   REFERENCES
[1] “Intrusion Detection Using Honeypots”-Neeraj
     Bhagat M.Tech Central University of Jammu, Deptt.
     of Computer Science & IT “2018 IEEE.
[2] “Intrusion Detection and Prevention using Honeypot
     Network for Cloud Security” Poorvika Singh Negi,
     Aditya Garg , Roshan Lal “2020 IEEE.
[3] T. M. Diansyah, I. Faisal, A. Perdana, B. O.
     Sembiring, and T. H. Sinaga, “Analysis of Using
     Firewall and Single Honeypot in Training Attack on
     Wireless Network,”.
[4] V. A. Perevozchikov, T. A. Shaymardanov, and I. V.
     Chugunkov, “New techniques of malware detection
     using FTP Honeypot systems,” Proc. 2017 IEEE.
[5] Mahmood, “Computer Science & Systems Biology
     The Use of Honeynets to Detect Exploited Systems
     Across the Wireless Networks,” vol. 11, no. 3, pp.
     219– 223, 2018.
[6] M. Nawrocki, W. Matthias, T. C. Schmidt, C. Keil,
     and J. Sch, “A Survey on Honeypot Software and
     Data Analysis,” 2000.
[7] U. Thakar, “HoneyAnalyzer– Analysis and Extraction
     of Intrusion Detection Patterns & Signatures Using
     Honeypot.”
[8] J. Wang and J. Zeng, “Construction of large-scale
     honeynet based on Honeyd,” Procedia Eng., vol. 15,
     pp. 3260–3264, 2011.
[9] Keogh E, Chakrabarti K, Pazzani M, et al.
     Dimensionality reduction for fast similarity search in
     large time series databases [J]. Journal of Knowledge
     and Information System,2002,3(3):263~286.
[10] Honeypots: The Need of Network Security Navneet
     Kambow#, Lavleen Kaur Passi Deparment of
     Computer Science, Shaheed Bhagat Singh State
     Technical Capmus, Ferozepur, India- Department of
     Computer Science, Arya bhatta Institte of
     Engineering and Technology, Barnala, India
[11] Navneet Kambow, Lavleen Kaur Passi, “Honeypots:
     The Need of Network Security”, International Journal
     of Computer Science and Information Technologies,
     Vol. 5 (5), 2014.
[12] BhaskarMandal,Tanupriya Choudhury,” A Key
     Agreement Scheme for Smart Cards Using
     Biometrics.”,     IEEE    International     Conference
     (Published in IEEE) ICCCA 2016, Galgotias
     University, 2016.
[13] Uma Somani, “Implementing Digital Signature with
     RSA Encryption Algorithm to Enhance the Data
     Security of Cloud in Cloud Computing,” 2010 1st
     International Conference on Parallel, Distributed and
     Grid Computing (PDGC- 2010).
[14] Gurpreet Singh, SupriyaKinger”Integrating AES,
     DES, and 3 -DES Encryption Algorithms for
     Enhanced DataSecurity “International Journal of
     Scientific & Engineering Research, Volume 4, Issue
     7, July-2013.

                                                     © 2021 IJSRET
                                                         1363
You can also read